We prioritize security over everything else.
Explore our end-to-end security concept.
We have a full-time researcher analyzing bridges in depth. We're publishing our results on our blog. Take for example this 40+ page arbitrary messaging bridge comparison framework. We compare our results against public frameworks from sources like L2Beat, and work with companies like Consensys on in-depth bridge risk assessment.